SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
CYBER CRIME & CYBER WAR
English . Reality . Data
THIS IS
• Purely academic debate. Do not read otherwise
• No room for discussion, but for arguments.
• My opinion on a deck and your opinion as voice
• Abuse of English
• Based on evidence ?
• Fact vs Fiction
• Cyber Crime Business Models
• Budget Meeting
ME
• I am Uday
• I work as a pen tester
• Currently into Data Analysis & Machine Learning Learning
• Yawn, Steam, Argue, Debate, Learn
• Big Data can change the world or solve some problems.
• Big data for hacking ? People are really doing that.
• Alejandro Caceres http://www.hyperiongray.com/
BEFORE WE START, PLEASE BE ASSURED
• All my words are an outcome of months of research
• We are always assured
• “The president of India would be visiting Hyderabad
tomorrow” and I have this information from an impeccable
source from the president’s staff at Rastrapathi Bhavan
HOW DOES ASSURANCE WORK ?
• Authoritative speech powerful enough to make me believe
that men are from mars and aliens are from earth
• When assured, there is no question left to ask
ASSURANCE & CYBER WAR
• Are we being assured that Cyber War is in progress ?
• Audience: What is Cyber War ?
• Audience: What is Cyber Crime ?
• Espionage vs Cyber War vs Cyber Crime ?
• Your responses are invaluable!
WHO HAS DEFINED CYBER WAR
• International Laws are still WIP
• Has EU or US declared definitions ? The answer is no.
• What has been taken into account to call this as a war ?
THE ‘ULTIMATELY’ JUSTIFICATION
• Ultimately, Cyber Wars have a toll on our daily lives.
WHATEVER HAPPENS ONLINE WITH US
• Is not cyber war
• Is not Cyber Terrorism
• Could be Cyber Bullying
• Could be violation of privacy
• Could have legal implications
• Could be cumbersome
• Affects our personal lives indirectly especially longterm
ENOUGH ENGLISH
• Do We have some data as evidence to argue upon ?
• Yes we do!
• Measuring Pay-per-Install: The Commoditization of Malware Distribution
• White Paper fromJuan Caballero, Chris Grier, Christian Kreibich, Vern
Paxson, Berkley
• Is this Authentic data ?
• Please be assured that this is more genuine than pure cocaine
CRIME AS A BUSINESS MODEL
• Can I design crime ?
• Instance: CarderPlanet.com
• PPI Model – Pay Per Install
• Exploit as a service
• Malware is the new commodity
• Better off than your shares and market
• Who the bullish ? What the bearish ?
SERVICE PROVIDER
• What is this PPI Market
Business
Client
• I am the bad
guy
Service • I run the show
Service
Affiliate
•Oh yeah!
Malware
WHAT IS THIS BUSINESS MODEL ?
• This is one observed business model that generates the
underground economy
• Offerings are highly customized
ARTICLE A YEAR AGO
• http://www.reddit.com/r/IAmA/comments/sq7cy/iama_a_mal
ware_coder_and_botnet_operator_ama/
• IAmA a malware coder and botnet operator, AMA
• TOR + Dedicated Enhanced Service
• Stealthy really
MEMORY ERRORS
• Past present Future
• Corrupted Pointer, Uninitialized Pointer Access, Out of bounds
etc.
• Subversion of logic
• This is relevant even today even after 20 years
SO WHAT DEFINITION IS WRONG ?
• Cyber War vs Cyber Crime
• We have never had a Cyber War yet
• This comes from the definition of traditional war
• We can have a separate debate on this
• When a conventional war follows the strategy of “Greater the
offense, Greater the defense”, Cyber War is opposite.
CYBER TERRORISM
• Many people are using this word already & extensively
• David Rappaport has not coined this term.
• I believe that the word “Cyber Terrorism” is completely wrong.
• You can have your view.
BUDGET MEETING
• $100-180 for Unique thousand installs, This is for US/UK/Europe
• $7-8 is the lowest for the same service, least popular
geography
• Rivalry in PPI
• Often difficult to validate on the installs when using two rival
PPI Providers
• Affiliates receive credit for confirmed Installs
CRIMEWARE KITS
• To build botnet variants
• Instance zbot
• This is not an exhaustive talk on cyber crime
• We can have a dedicated session for a deep dive on cyber
crime
• Let’s quickly see what someone from NATO has to say
• (NATO – Cyber War exists Video)

Weitere ähnliche Inhalte

Ähnlich wie Cyber Crime & Cyber War

Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and ConcernsPINT Inc
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Enterprise SEO and AI - Houston IMA Interactive Strategies 17
Enterprise SEO and AI - Houston IMA Interactive Strategies 17Enterprise SEO and AI - Houston IMA Interactive Strategies 17
Enterprise SEO and AI - Houston IMA Interactive Strategies 17Keith Goode
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Justin Bull
 
Bright Light Web
Bright Light WebBright Light Web
Bright Light WebLiviuOlos
 
2021 11 09_mill06
2021 11 09_mill062021 11 09_mill06
2021 11 09_mill06Doc Searls
 
Innovation prezo
Innovation prezoInnovation prezo
Innovation prezoDavid Cohn
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideSteve Poole
 
Ar design reality2018
Ar design reality2018Ar design reality2018
Ar design reality2018Anselm Hook
 
Publishing Today The Problem
Publishing Today The ProblemPublishing Today The Problem
Publishing Today The ProblemGraeme Bryan
 
Voting Systems - ISSA Chicago Presentation 2020
Voting Systems - ISSA Chicago Presentation 2020Voting Systems - ISSA Chicago Presentation 2020
Voting Systems - ISSA Chicago Presentation 2020Chris Roberts
 
Zemura Digital Store plan
Zemura Digital Store planZemura Digital Store plan
Zemura Digital Store planOdo Eniang
 
Jeff Katz on Lean Hardware Startups
Jeff Katz on Lean Hardware StartupsJeff Katz on Lean Hardware Startups
Jeff Katz on Lean Hardware StartupsJeff Katz
 

Ähnlich wie Cyber Crime & Cyber War (20)

Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Enterprise SEO and AI - Houston IMA Interactive Strategies 17
Enterprise SEO and AI - Houston IMA Interactive Strategies 17Enterprise SEO and AI - Houston IMA Interactive Strategies 17
Enterprise SEO and AI - Houston IMA Interactive Strategies 17
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)
 
Bright Light Web
Bright Light WebBright Light Web
Bright Light Web
 
2021 11 09_mill06
2021 11 09_mill062021 11 09_mill06
2021 11 09_mill06
 
Innovation prezo
Innovation prezoInnovation prezo
Innovation prezo
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker Side
 
Cyber security - Trend Micro
Cyber security  - Trend MicroCyber security  - Trend Micro
Cyber security - Trend Micro
 
Ar design reality2018
Ar design reality2018Ar design reality2018
Ar design reality2018
 
Publishing Today The Problem
Publishing Today The ProblemPublishing Today The Problem
Publishing Today The Problem
 
Voting Systems - ISSA Chicago Presentation 2020
Voting Systems - ISSA Chicago Presentation 2020Voting Systems - ISSA Chicago Presentation 2020
Voting Systems - ISSA Chicago Presentation 2020
 
Norway real-2
Norway real-2Norway real-2
Norway real-2
 
Zemura Digital Store plan
Zemura Digital Store planZemura Digital Store plan
Zemura Digital Store plan
 
Jeff Katz on Lean Hardware Startups
Jeff Katz on Lean Hardware StartupsJeff Katz on Lean Hardware Startups
Jeff Katz on Lean Hardware Startups
 

Mehr von n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Kürzlich hochgeladen

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Kürzlich hochgeladen (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Cyber Crime & Cyber War

  • 1. CYBER CRIME & CYBER WAR English . Reality . Data
  • 2. THIS IS • Purely academic debate. Do not read otherwise • No room for discussion, but for arguments. • My opinion on a deck and your opinion as voice • Abuse of English • Based on evidence ? • Fact vs Fiction • Cyber Crime Business Models • Budget Meeting
  • 3. ME • I am Uday • I work as a pen tester • Currently into Data Analysis & Machine Learning Learning • Yawn, Steam, Argue, Debate, Learn • Big Data can change the world or solve some problems. • Big data for hacking ? People are really doing that. • Alejandro Caceres http://www.hyperiongray.com/
  • 4. BEFORE WE START, PLEASE BE ASSURED • All my words are an outcome of months of research • We are always assured • “The president of India would be visiting Hyderabad tomorrow” and I have this information from an impeccable source from the president’s staff at Rastrapathi Bhavan
  • 5. HOW DOES ASSURANCE WORK ? • Authoritative speech powerful enough to make me believe that men are from mars and aliens are from earth • When assured, there is no question left to ask
  • 6. ASSURANCE & CYBER WAR • Are we being assured that Cyber War is in progress ? • Audience: What is Cyber War ? • Audience: What is Cyber Crime ? • Espionage vs Cyber War vs Cyber Crime ? • Your responses are invaluable!
  • 7. WHO HAS DEFINED CYBER WAR • International Laws are still WIP • Has EU or US declared definitions ? The answer is no. • What has been taken into account to call this as a war ?
  • 8. THE ‘ULTIMATELY’ JUSTIFICATION • Ultimately, Cyber Wars have a toll on our daily lives.
  • 9. WHATEVER HAPPENS ONLINE WITH US • Is not cyber war • Is not Cyber Terrorism • Could be Cyber Bullying • Could be violation of privacy • Could have legal implications • Could be cumbersome • Affects our personal lives indirectly especially longterm
  • 10. ENOUGH ENGLISH • Do We have some data as evidence to argue upon ? • Yes we do! • Measuring Pay-per-Install: The Commoditization of Malware Distribution • White Paper fromJuan Caballero, Chris Grier, Christian Kreibich, Vern Paxson, Berkley • Is this Authentic data ? • Please be assured that this is more genuine than pure cocaine
  • 11. CRIME AS A BUSINESS MODEL • Can I design crime ? • Instance: CarderPlanet.com • PPI Model – Pay Per Install • Exploit as a service • Malware is the new commodity • Better off than your shares and market • Who the bullish ? What the bearish ?
  • 12. SERVICE PROVIDER • What is this PPI Market Business Client • I am the bad guy Service • I run the show Service Affiliate •Oh yeah! Malware
  • 13. WHAT IS THIS BUSINESS MODEL ? • This is one observed business model that generates the underground economy • Offerings are highly customized
  • 14.
  • 15. ARTICLE A YEAR AGO • http://www.reddit.com/r/IAmA/comments/sq7cy/iama_a_mal ware_coder_and_botnet_operator_ama/ • IAmA a malware coder and botnet operator, AMA • TOR + Dedicated Enhanced Service • Stealthy really
  • 16. MEMORY ERRORS • Past present Future • Corrupted Pointer, Uninitialized Pointer Access, Out of bounds etc. • Subversion of logic • This is relevant even today even after 20 years
  • 17.
  • 18.
  • 19.
  • 20. SO WHAT DEFINITION IS WRONG ? • Cyber War vs Cyber Crime • We have never had a Cyber War yet • This comes from the definition of traditional war • We can have a separate debate on this • When a conventional war follows the strategy of “Greater the offense, Greater the defense”, Cyber War is opposite.
  • 21. CYBER TERRORISM • Many people are using this word already & extensively • David Rappaport has not coined this term. • I believe that the word “Cyber Terrorism” is completely wrong. • You can have your view.
  • 22. BUDGET MEETING • $100-180 for Unique thousand installs, This is for US/UK/Europe • $7-8 is the lowest for the same service, least popular geography • Rivalry in PPI • Often difficult to validate on the installs when using two rival PPI Providers • Affiliates receive credit for confirmed Installs
  • 23. CRIMEWARE KITS • To build botnet variants • Instance zbot • This is not an exhaustive talk on cyber crime • We can have a dedicated session for a deep dive on cyber crime • Let’s quickly see what someone from NATO has to say
  • 24. • (NATO – Cyber War exists Video)